Chun Shan

Orcid: 0000-0002-1090-026X

According to our database1, Chun Shan authored at least 58 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Velocity tracking control of nodes for the nonlinear complex dynamical networks associated with outgoing links subsystem.
Comput. Commun., January, 2024

2023
A dual-embedded tamper detection framework based on block truncation coding for intelligent multimedia systems.
Inf. Sci., November, 2023

DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks.
Inf. Sci., October, 2023

Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication.
IEEE Commun. Mag., April, 2023

Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks.
IEEE Trans. Netw. Sci. Eng., 2023

ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds.
IEEE Trans. Dependable Secur. Comput., 2023

B-UAVM: A Blockchain-Supported Secure Multi-UAV Task Management Scheme.
IEEE Internet Things J., 2023

Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme.
Neurocomputing, 2023

Detecting Smart Contract Project Anomalies in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

CMG-Net: An End-to-End Contact-based Multi-Finger Dexterous Grasping Network.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

2022
Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks.
IEEE Netw., 2022

A GAN-based method for time-dependent cloud workload generation.
J. Parallel Distributed Comput., 2022

MaliCage: A packed malware family classification framework based on DNN and GAN.
J. Inf. Secur. Appl., 2022

Digital watermarking method for image feature point extraction and analysis.
Int. J. Intell. Syst., 2022

Contributions of individual muscle forces to hip, knee, and ankle contact forces during the stance phase of running: a model-based study.
Health Inf. Sci. Syst., 2022

A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences.
CoRR, 2022

Calculation of utility of network services based on state manifolds.
Comput. Networks, 2022

An edge computing based anomaly detection method in IoT industrial sustainability.
Appl. Soft Comput., 2022

2021
Modulation of the Transmission Spectra of the Double-Ring Structure by Surface Plasmonic Polaritons.
Wirel. Commun. Mob. Comput., 2021

Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for UAV Charging Stations.
IEEE Trans. Green Commun. Netw., 2021

AdaGUM: An Adaptive Graph Updating Model-Based Anomaly Detection Method for Edge Computing Environment.
Secur. Commun. Networks, 2021

Compressed Wavelet Tensor Attention Capsule Network.
Secur. Commun. Networks, 2021

Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method.
Comput. Secur., 2021

A novel chromosome instance segmentation method based on geometry and deep learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Collaborative Edge Learning in MIMO-NOMA Uplink Transmission Environment.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

Joint Matrix Completion and Randomized SVD Channel Estimation of the mmWave Massive MIMO.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2021, Shenzhen, 2021

2020
Malware classification for the cloud via semi-supervised transfer learning.
J. Inf. Secur. Appl., 2020

Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns.
Int. J. Softw. Eng. Knowl. Eng., 2020

Research on Network Risk Evaluation Method Based on a Differential Manifold.
IEEE Access, 2020

2019
A Novel Algorithm for Identifying Key Function Nodes in Software Network Based on Evidence Theory.
Int. J. Softw. Eng. Knowl. Eng., 2019

Node importance to community based caching strategy for information centric networking.
Concurr. Comput. Pract. Exp., 2019

Software structure characteristic measurement method based on weighted network.
Comput. Networks, 2019

An Adaptive Ensemble Machine Learning Model for Intrusion Detection.
IEEE Access, 2019

Software Defect Prediction Model Based On KPCA-SVM.
Proceedings of the 2019 IEEE SmartWorld, 2019

A Vulnerability Detection Model for Java Systems Based on Complex Networks.
Proceedings of the 2019 IEEE SmartWorld, 2019

Research on a Multi-Level Combination of Software Defect Localization Method.
Proceedings of the 2019 IEEE SmartWorld, 2019

2018
IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering.
Symmetry, 2018

An Approach for Internal Network Security Metric Based on Attack Probability.
Secur. Commun. Networks, 2018

Analysis on Influential Functions in the Weighted Software Network.
Secur. Commun. Networks, 2018

An improved trusted method for global congestion price computing based on software defined networking in data-centred network.
Int. J. Intell. Inf. Database Syst., 2018

Malware Visualization for Fine-Grained Classification.
IEEE Access, 2018

Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System.
Proceedings of the 6th International Conference on Wireless Networks and Mobile Communications, 2018

Software System Representation Methods Based on Algebraic Component.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Vulnerability Prediction Based on Weighted Software Network for Secure Software Building.
Proceedings of the IEEE Global Communications Conference, 2018

Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size.
Proceedings of the Advances in Internet, 2018

Homomorphic Authentication Based on Rank-Based Merkle Hash Tree.
Proceedings of the Advances in Internet, 2018

On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme.
Proceedings of the Advances on P2P, 2018

Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing.
Proceedings of the Advances on P2P, 2018

2017
Coverage probability in cognitive radio networks powered by renewable energy with primary transmitter assisted protocol.
Inf. Sci., 2017

A Detecting Method of Array Bounds Defects Based on Symbolic Execution.
Proceedings of the Network and System Security - 11th International Conference, 2017

SulleyEX: A Fuzzer for Stateful Network Protocol.
Proceedings of the Network and System Security - 11th International Conference, 2017

An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble.
Proceedings of the Advances in Internetworking, 2017

Predicting Vulnerable Software Components Using Software Network Graph.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Optimization of program recursive function calls analysis method.
Autom. Control. Comput. Sci., 2016

Petri Net Applied in Document Flow Management System.
Proceedings of the Human Centered Computing - Second International Conference, 2016

The Quality Control and Management of Component-Oriented Software Development.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Design and implementation of Data Center Network Global Congestion Price Calculating method based on Software Defined Networking.
Proceedings of the Advances on P2P, 2016

2015
Research on Identification and Addressing of the Internet of Things.
Proceedings of the 10th International Conference on P2P, 2015


  Loading...